An Asymmetric Traceability Scheme for Copyright Protection without Trust Assumptions [chapter]

Emmanouil Magkos, Panayiotis Kotzanikolaou, Vassilios Chrissikopoulos
2001 Lecture Notes in Computer Science  
Traceability schemes (also known as traitor tracing schemes) have been proposed as a method to establish copyright protection of broadcast information. With asymmetric traceability, the merchant cannot frame an innocent user, while no user can abuse the system without being detected. We propose an asymmetric solution for traceability, based on a very efficient symmetric scheme [4]. We do not make any trust assumptions about the broadcasting center or other authorities. Furthermore, we establish
more » ... anonymity protection for all honest users: the identity of a user is protected, until a "fingerprint" of that user is found on a pirate decoder. We make use of well-known cryptographic techniques, such as oblivious transfer, time-lock puzzles and blind signatures
doi:10.1007/3-540-44700-8_18 fatcat:tkvroyliljbf7knbnatsbeeffi